Analysis
-
max time kernel
124s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe
Resource
win7-20240221-en
General
-
Target
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe
-
Size
184KB
-
MD5
8a0bb6cf20778dd7302567394b9bcba3
-
SHA1
a37d9c5bbcdeeedcfd2a5bd408636d6beac2beb2
-
SHA256
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e
-
SHA512
781f38b430b287846a4fc2c77adcdeb5da66c1bc52ab3906cf65adb3cfd4dbf7427310d08c8698fce4354e1a45a5ce32ca410e708a26e9c37ebef175be6b6077
-
SSDEEP
3072:W4/Wd8bsXQJl5vgl8MpvnNHOV9MdtZC+KPfH5Qzd:W4/23XQJovNO9M7ZWPfH5Qzd
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 39 IoCs
Processes:
resource yara_rule behavioral2/memory/4240-1-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-4-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-5-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-16-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-6-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-32-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-14-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-28-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-31-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-33-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-34-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-35-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-36-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-37-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-38-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-40-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-41-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-42-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-46-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-47-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-48-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-50-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-53-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-54-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-58-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-59-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-66-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-68-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-70-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-73-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-74-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-76-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-78-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-80-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-82-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-84-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-87-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-88-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/4240-92-0x0000000002960000-0x0000000003A1A000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 39 IoCs
Processes:
resource yara_rule behavioral2/memory/4240-1-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-4-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-5-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-16-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-6-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-32-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-14-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-28-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-31-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-33-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-34-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-35-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-36-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-37-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-38-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-40-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-41-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-42-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-46-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-47-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-48-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-50-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-53-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-54-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-58-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-59-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-66-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-68-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-70-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-73-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-74-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-76-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-78-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-80-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-82-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-84-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-87-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-88-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX behavioral2/memory/4240-92-0x0000000002960000-0x0000000003A1A000-memory.dmp UPX -
Processes:
resource yara_rule behavioral2/memory/4240-1-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-4-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-5-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-16-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-6-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-32-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-14-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-28-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-31-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-33-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-34-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-35-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-36-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-37-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-38-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-40-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-41-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-42-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-46-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-47-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-48-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-50-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-53-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-54-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-58-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-59-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-66-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-68-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-70-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-73-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-74-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-76-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-78-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-80-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-82-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-84-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-87-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-88-0x0000000002960000-0x0000000003A1A000-memory.dmp upx behavioral2/memory/4240-92-0x0000000002960000-0x0000000003A1A000-memory.dmp upx -
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win32SystemFile = "C:\\MSystem.exe" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftPCHealth = "C:\\Windows\\System32\\PCHealth.exe" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Application Installer = "C:\\Windows\\Installer\\Installer.exe" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process File opened (read-only) \??\J: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\Q: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\W: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\K: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\N: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\Z: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\H: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\I: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\R: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\S: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\U: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\X: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\V: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\E: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\G: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\L: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\M: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\O: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\P: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\T: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened (read-only) \??\Y: 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process File opened for modification C:\autorun.inf 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification F:\autorun.inf 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Drops file in System32 directory 2 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process File created C:\Windows\SysWOW64\PCHealth.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Windows\SysWOW64\PCHealth.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Drops file in Program Files directory 12 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\7-Zip\7z.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Drops file in Windows directory 4 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process File created C:\Windows\e5736cf 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Windows\SYSTEM.INI 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File created C:\Windows\Installer\Installer.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe File opened for modification C:\Windows\Installer\Installer.exe 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exepid process 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription pid process Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Token: SeDebugPrivilege 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exepid process 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription pid process target process PID 4240 wrote to memory of 776 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 784 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 1016 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe dwm.exe PID 4240 wrote to memory of 2888 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe sihost.exe PID 4240 wrote to memory of 3004 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 428 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe taskhostw.exe PID 4240 wrote to memory of 3412 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Explorer.EXE PID 4240 wrote to memory of 3580 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 3764 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe DllHost.exe PID 4240 wrote to memory of 3860 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe StartMenuExperienceHost.exe PID 4240 wrote to memory of 3924 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 4000 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe SearchApp.exe PID 4240 wrote to memory of 3568 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 3076 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe TextInputHost.exe PID 4240 wrote to memory of 4932 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 3184 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe backgroundTaskHost.exe PID 4240 wrote to memory of 1932 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe backgroundTaskHost.exe PID 4240 wrote to memory of 776 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 784 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 1016 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe dwm.exe PID 4240 wrote to memory of 2888 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe sihost.exe PID 4240 wrote to memory of 3004 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 428 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe taskhostw.exe PID 4240 wrote to memory of 3412 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Explorer.EXE PID 4240 wrote to memory of 3580 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 3764 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe DllHost.exe PID 4240 wrote to memory of 3860 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe StartMenuExperienceHost.exe PID 4240 wrote to memory of 3924 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 4000 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe SearchApp.exe PID 4240 wrote to memory of 3568 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 3076 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe TextInputHost.exe PID 4240 wrote to memory of 4932 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 3184 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe backgroundTaskHost.exe PID 4240 wrote to memory of 1932 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe backgroundTaskHost.exe PID 4240 wrote to memory of 2088 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 1996 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 776 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 784 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 1016 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe dwm.exe PID 4240 wrote to memory of 2888 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe sihost.exe PID 4240 wrote to memory of 3004 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 428 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe taskhostw.exe PID 4240 wrote to memory of 3412 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Explorer.EXE PID 4240 wrote to memory of 3580 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 3764 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe DllHost.exe PID 4240 wrote to memory of 3860 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe StartMenuExperienceHost.exe PID 4240 wrote to memory of 3924 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 4000 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe SearchApp.exe PID 4240 wrote to memory of 3568 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 3076 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe TextInputHost.exe PID 4240 wrote to memory of 4932 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 3184 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe backgroundTaskHost.exe PID 4240 wrote to memory of 2088 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 1996 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe RuntimeBroker.exe PID 4240 wrote to memory of 776 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 784 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe fontdrvhost.exe PID 4240 wrote to memory of 1016 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe dwm.exe PID 4240 wrote to memory of 2888 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe sihost.exe PID 4240 wrote to memory of 3004 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 428 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe taskhostw.exe PID 4240 wrote to memory of 3412 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe Explorer.EXE PID 4240 wrote to memory of 3580 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe svchost.exe PID 4240 wrote to memory of 3764 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe DllHost.exe PID 4240 wrote to memory of 3860 4240 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe StartMenuExperienceHost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1016
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3004
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe"C:\Users\Admin\AppData\Local\Temp\06f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3764
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3924
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4000
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3568
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3076
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4932
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3184
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1932
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD58a0bb6cf20778dd7302567394b9bcba3
SHA1a37d9c5bbcdeeedcfd2a5bd408636d6beac2beb2
SHA25606f3d2aef65a1dd0f086c29bb0af678f570b1d76ee45c4ecc13994738bf2ea4e
SHA512781f38b430b287846a4fc2c77adcdeb5da66c1bc52ab3906cf65adb3cfd4dbf7427310d08c8698fce4354e1a45a5ce32ca410e708a26e9c37ebef175be6b6077
-
Filesize
97KB
MD5e76f99448ab5b880b19d1dfc2136476f
SHA1d8076dd65ca52e8da78baaf82693aad0f459bc99
SHA25604fac0d087b08aa4db61eaced59c7526d3cca2840caf2af17dbe6fb86edd519d
SHA5122463d1dd98dd6d6e7708735766db86045df17fd32f861e600a0c255793151726a954e4f56af2422a3c15433d638fc95571e56a15753e48c27bc929aae9744fe6